Q. Which of the following is not done by cyber criminals?
A. Unauthorized account access
B. Mass attack using Trojans as botnets
C. Email spoofing and spamming
D. Report vulnerability in any system
Answer: Report vulnerability in any system
A. Unauthorized account access
B. Mass attack using Trojans as botnets
C. Email spoofing and spamming
D. Report vulnerability in any system
Answer: Report vulnerability in any system